Digital Forensic Investigation
Computer Forensics

Computer forensics is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information.

Although it is most often associated with the investigation of a wide variety of computer crime, computer forensics may also be used in civil proceedings. The discipline involves similar techniques and principles to data recovery, but with additional guidelines and practices designed to create a legal audit trail.

Digitpol’s computer forensics experts investigate, analyse and recover forensic data from computers, portable devices and hard disk drives. We ensure that no digital evidence is overlooked and assist at any stage of an investigation, regardless of the size or location of data sources. Claims of leaks, fraud, cyber espionage, financial tampering, computer crime, employee misconduct, and other illegal or wrongdoing actions require corporations, law firms, and government agencies to deploy digital forensic methods to piece together facts that lead to the truth.

Unauthorised access

We investigate and analyse unauthorised access or hacking incidents such as when someone gains access to your computer or device without your permission. Hackers may gain access to your computer or device through security weaknesses, malware or phishing. Once they have compromised your email, banking or social media accounts, they can change passwords preventing you from accessing your account. Scammers often send out messages impersonating and directing people to fake websites, or asking them to send money. Modern attacks are very sophisticated the fake websites may seem to be genuine.

Malware

Criminals may use malicious software (or malware) to monitor your online activity and cause damage to the computer. Malware is often downloaded when people open an infected email attachment or click a suspicious link in an email. Malware can also be used to steal your usernames, passwords or other information, which is then forwarded to a third party.

‘Malware’ is a catch all term to describe different types of malware which include viruses, worms, spyware, trojans or bots.

Sophisticated attacks

Sophisticated criminals are active daily to exploit vulnerabilities on computers and other devices. Some of the techniques they use include:

  • unauthorised access or hacking – when someone gains access to your computer or device without permission,
  • malware – malicious software (such as viruses, trojans and spyware) which monitor your online activity and cause damage to the computer,
  • denial of service attacks – an attack which floods a computer or website with data, causing it to overload and prevent it from functioning properly. This type of attack is more frequently targeted at businesses, rather than individuals.
Denial of service or distributed denial of service attacks

Cyber attacks are common and often a method seen is a denial of service attack which floods a computer or website with data, which can overload the system or computer and prevent it from functioning properly. Unlike hacking or malware, it generally doesn’t involve access to the computer system. A distributed denial of service (DDoS) attack is a denial of service attack that comes from multiple systems, often a network of compromised computers.

Our Solutions

Digitpol’s computer forensics experts investigate, analyse and recover forensic data from computers, portable devices and hard disk drives.

We specialize in recovery of data from mobile phones and portable devices. We recover SMS, Calls, Emails, Media, VoIP data, GPS, Internet History, Whatsapp, Viber, Signal, Telegram, Deleted Data, Cloud Sources and all Cell ID Data.

Cloud data sources represent a virtual goldmine of potential evidence for forensic investigators. Together with mobile device data, they often capture the details and critical connections investigators need to solve crimes. Digitpol can access cloud sources and recover data contained in cloud services.